Reputation based clustering algorithm for security management in ad hoc networks with liars.
Mohamed Elhoucine ElhdhiliLamia Ben AzzouzFarouk KamounPublished in: CRiSIS (2008)
Keyphrases
- ad hoc networks
- security management
- clustering algorithm
- routing protocol
- end to end
- security policies
- routing algorithm
- multi tier
- wireless ad hoc networks
- wireless networks
- network security
- multi hop
- quality of service
- key management
- mobile networks
- base station
- network nodes
- mobile ad hoc networks
- security issues
- peer to peer
- sensor networks
- wifi
- computer systems
- multipath
- data processing